03409cam a2200397Ii 4500991003249879707536m d cr cn|||||||||070806s2005 maua s 001 0 eng d97815974901841597490180b13655425-39ule_inst113428:113518Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSOPELSTEFA005.822Wotring, Brian.627550Host integrity monitoring[electronic resource] :using Osiris and Samhain /Bian Wotring; Bruce Potter, technical editor; foreword by Marcus J. Ranum.Rockland, MA :Syngress,c2005.xxvi, 421 p. :ill. ;23 cm.Includes index.Chapter 1: Fundamentals; Chapter 2: Understanding The Terrain In order to be effective at understanding what to monitor; Chapter 3: Threats; Chapter 4: Planning The key to obtaining the most out of the adoption of host integrity tools; Chapter 5: Osiris; Chapter 6: Samhain; Chapter 7: Analysis and Response; Appendix A: Monitoring Linksys Devices Appendix B: Advanced Strategies.This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments. Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy. * Brian Wotring is the creator of Osiris. He speaks and writes frequently on Osiris for major magazines, Web sites, and trade shows. And, the book can be prominently marketed from the Osiris Web site * This is the first book published on host integrity monitoring, despite the widespread deployment of Osiris and Samhain * Host Integrity Monitoring is the only way to accurately determine if a malicious attacker has successfully compromised the security measures of your network.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer networksSecurity measures.Electronic books.localPotter, Bruce.authorhttp://id.loc.gov/vocabulary/relators/aut621288Ranum, Marcus J.Original15974901809781597490184(OCoLC)61231484Referexhttp://www.sciencedirect.com/science/book/9781597490184An electronic book accessible through the World Wide Web; click for information.b1365542524-02-2224-01-08991003249879707536C0TEFHost integrity monitoring1463980UNISALENTOle02924-01-08mm -engmau00